Optimizing learning in image retrieval

Y Rui, T Huang - … IEEE Conference on Computer Vision and …, 2000 - ieeexplore.ieee.org
Combining learning with vision techniques in interactive image retrieval has been an active
research topic during the past few years. However, existing learning techniques either are …

Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology

L Romano, S D'Antonio, V Formicola… - … Safety, Reliability, and …, 2012 - Springer
Abstract Attacks on Critical Infrastructures are increasing and becoming more sophisticated.
In addition to security issues of Supervisory Control And Data Acquisition systems, new …

Improving social odometry robot networks with distributed reputation systems for collaborative purposes

D Fraga, A Gutiérrez, JC Vallejo, A Campo, Z Bankovic - Sensors, 2011 - mdpi.com
The improvement of odometry systems in collaborative robotics remains an important
challenge for several applications. Social odometry is a social technique which confers the …

Artificial Intelligence in Mobile and Modern Wireless Networks

MA Khan, M Anjum, SA Hassan… - AI and Its Convergence …, 2023 - igi-global.com
Wireless communication systems have become fundamental to the information centric
infrastructure of today. Due to their high demand, accessibility, and ease of use, they have …

Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends

M USMAN, V MUTHUKKUMARASAMY… - Security for Multihop …, 2014 - taylorfrancis.com
The node anomalies may be caused due to resource degradation, node failures and
restarts, physical attack, and malfunctioning. In physical attacks, nodes are captured and …

Holistic solution for confining insider attacks in wireless sensor networks using reputation systems coupled with clustering techniques

Z Bankovic, JM Moya, JC Vallejo… - … Conference on Trust …, 2011 - ieeexplore.ieee.org
The most serious obstacle in further proliferation of wireless sensor networks is their low
level of security, where the insider attacks are the most challenging issue. In this work we …

[PDF][PDF] Trust-ware: A methodology to analyze, design, and secure trust and reputation systems

DF Aydillo - 2015 - core.ac.uk
By collective intelligence we understand a form of intelligence that emerges from the
collaboration and competition of many individuals, or strictly speaking, many entities. Based …

Trust-ware: a methodology to analyze, design, and secure trust and reputation systems

D Fraga Aydillo - 2015 - oa.upm.es
By collective intelligence we understand a form of intelligence that emerges from the
collaboration and competition of many individuals, or strictly speaking, many entities. Based …

Anomaly Detection in Wireless Sensor networks

M Usman, V Muthukkumarasamy… - Security for Multihop …, 2014 - api.taylorfrancis.com
Over the course of recent years more and more sophisticated threats have emerged for
wireless sensor networks (WSNs) due to innovations and advancements in the technology …

[引用][C] Design and Analysis of Mobile Agent-Enabled Anomaly Detection and Verification in Wireless Sensor Networks

M Usman - 2015